Skip to content

Commit 78b6512

Browse files
Merge pull request #16891 from apwestgarth/2024R1
Add note re adding redirecturi known issue
2 parents 8cff6fb + 2a439bb commit 78b6512

File tree

1 file changed

+47
-2
lines changed

1 file changed

+47
-2
lines changed

azure-stack/operator/app-service-release-notes-2024R1.md

Lines changed: 47 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,9 @@ title: App Service on Azure Stack Hub 24R1 release notes
33
description: Learn about what's new and updated in the App Service on Azure Stack Hub 24R1 release.
44
author: apwestgarth
55
ms.topic: article
6-
ms.date: 12/09/2024
6+
ms.date: 01/31/2025
77
ms.author: anwestg
88
ms.reviewer:
9-
109
---
1110

1211
# App Service on Azure Stack Hub 24R1 release notes
@@ -284,6 +283,52 @@ This script must be run under the following conditions:
284283
GO
285284
```
286285

286+
- A new Redirect URL must be added to the Identity Application created in order to support Single Sign On(SSO) Scenarios (for example Kudu)
287+
288+
# [Entra ID](#tab/EntraID)
289+
290+
## Retrieve the Identity Application Client ID
291+
1. In the Azure Stack admin portal, navigate to the **ControllersNSG** Network Security Group.
292+
1. By default, remote desktop access is disabled to all App Service infrastructure roles. Modify the **Inbound_Rdp_3389** rule action to **Allow** access.
293+
1. Navigate to the resource group containing the App Service Resource Provider deployment. By default, the resource group is named with the format `AppService.<region>`, and connected to **CN0-VM**.
294+
1. Launch the **Web Cloud Management Console**.
295+
1. Check the **Web Cloud Management Console -> Web Cloud** screen and verify that both **Controllers** are **Ready**.
296+
1. Select **Settings**.
297+
1. Find the **ApplicationClientId** setting. Retrieve the value.
298+
1. In the Azure Stack admin portal, navigate back to the **ControllersNSG** Network Security Group.
299+
1. Modify the **Inbound_Rdp_3389** rule to deny access.
300+
301+
## Update the Entra ID Application with new Redirect URI
302+
303+
1. Sign into the **Azure** Portal to access the Entra ID tenant you connected your Azure Stack Hub to at deployment time.
304+
1. Using the **Azure** Portal and navigate to **Microsoft Entra ID**
305+
1. Search your tenant for the ApplicationClientId you retrieved earlier.
306+
1. Select the Application
307+
1. Select **Authentication**
308+
1. Add an additional Redirect URI to the existing list - **https://azsstamp.sso.appservice.\<region\>.\<DomainName\>.\<extension\>**
309+
310+
311+
# [ADFS](#tab/ADFS)
312+
313+
## Retrieve the Identity Application
314+
1. Open a [session to the Privileged Endpoint](azure-stack-privileged-endpoint.md)
315+
1. Run the following command to retrieve the ADFS Graph Applications
316+
317+
``` PowerShell
318+
Get-GraphApplication
319+
```
320+
321+
1. Find the Identifier for the AzureStack-AppService application
322+
1. Update the RedirectURIs for the application:
323+
324+
``` PowerShell
325+
$RedirectURIs = "@("https://appservice.sso.appservice.\<region\>.\<DomainName\>.\<extension\>", "https://azsstamp.sso.appservice.\<region\>.\<DomainName\>.\<extension\>", "https://api.appservice.\<region\>.\<DomainName\>.\<extension\>:44300/manage")
326+
Set-GraphApplication -ApplicationIdentifier <insert Identifier value> -ClientRedirectUris $RedirectURIs
327+
```
328+
329+
1. Close the session to the Privileged Endpoint
330+
---
331+
287332
## Known issues (post-installation)
288333

289334
- Workers are unable to reach file server when App Service is deployed in an existing virtual network, and the file server is only available on the private network, as called out in the Azure App Service on Azure Stack deployment documentation.

0 commit comments

Comments
 (0)